SlideShare a Scribd company logo
1 of 41
Konferenca za izzive vodenja, tveganj, varnosti in
revizije IKT
Ljubljana, Oktober 2016
Cyber security awareness of critical infrastructures
in N/E of Italy: scenarios and guidelines for self-
assesement



Ozaveščenost o varnosti spleta in kritične
infrastrukture v severni Italiji: Scenariji in smernice
kako opraviti samooceno
Luca Moroni, CISA, ITIL

Via Virtuosa – ISACA Venice Chapter
membership growth
ISACA VENICE research team coordinator
✔ Research n.1: Vulnerability and Penetration Test. User’s guidelines
about third party penetration test. 

✔ Research n.5: Cyber Security Awareness of N/E Italian Critical
Infrastructures: Scenarios and Guidelines for self-assessment
Member of ISACA VENICE Chapter Translation team
✔ Securing Mobile Devices – ITA
Geaduation in Computer Science (1989 Milan), CISA e ITIL V3
certified and other tech certification
Focused on Cybersecurity since 2000 and lecturer in some
seminars about this topic
Founder of the innovative company Via Virtuosa, which focuses
on scouting and promotion expertise in Cybersecurity and IT
governance in NE of Italy.
Luca Moroni
Who am i
Giuseppe Esposito CISA, PMP, LA 27001, CSA-
STAR, 22301, 9001, ITIL-V3 Foundation, ISO2000
Foundation
Alessandro Guarino LA 27001
Pierlugi Sartori CISSP, CISM, CGEIT, CRISC,
MBCI
and
Chapter past president Orillo Narduzzo for the trust
My team in Research
Seminar ISACA VENICE CHAPTER
3 Oct 2014 – Venice
Dr. Marco Balduzzi (In)security of smart transportation at sea

The Automated identification System (AIS)
On 2014Th this question:

Have you never done an internal Cybersecurity analysis?
Where the analysis is composed of a series of processes that simulate the actions normally
performed by an employee and consultant in the internal network.
Yes
No
No need
Vulnerability Assessment e Penetration Test. User’s
guidelines in selection third parity of penetration tests
Disaster 9 October 1963 - Vajont Dam. During initial filling, a
massive landslide caused a man-made megatsunami in the
lake. https://en.wikipedia.org/wiki/Vajont_Dam
But if was a Company or a PA with an
impact on social life?
An infrastructure is considered critical in
Europe if an incident would have a serious
impact on the social life of the citizens,
that is, for example, on health, physical
and logical security or economic well-
being of citizens or the effective
functioning of the State; or it could lead
to serious social consequences or other
dramatic consequences for the
community.
What is a Critical Infrastructure (IC)?
• Energy
• Telecommunications
• Water
• Food
• Health
• Transports
• Banks
• Civil defence
• ALL COMPANIES IN WHICH THE DAMAGEMENT OF
SYSTEMS IMPACTS LIFE
What is an Italian Critical Sector?
9/3/2014: The Italian Cabinet for the first time places first of the Cyber
Threat.
Italy has one of the highest rates in Europe of medium companies, small
and micro - enterprises, which hold assets in terms of know -how.
Two main problems :
1 ) Stakeholders using cyber tools
2 ) Small and medium-sized enterprises are far less protected
Source: http://www.agendadigitale.eu/infrastrutture/722_cybercrime-danneggia-il-sistema-italia-per-20-40-mld-annui.htm
Cyber Threat for Italian IC
Feb. 2016: Special attention should
be given to the legislative and
regulatory framework that
addresses issues related to the
protection of critical infrastructure
in the IC support sector.
Source: http://www.mizs.gov.si/fileadmin/mizs.gov.si/pageuploads/Informacijska_druzba/pdf/Cyber_Security_Strategy_Slovenia.pdf
Cyber Threat for Slovenia IC
® White Paper 2013 Isaca Venezia
Cyber Security Awareness of Critical Infrastructures in North East of Italy: Scenario and Guidelines for self-assessment
Survey on 55 companies
The companies belonging to the sectors
critics in the Italy North East
Transports
Food
Water
Telecommuni
cations
Health
Transports
Banks
Civil Defence
Energy
Yes No
® White Paper 2013 Isaca Venezia
Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement
Survey on 55 companies
QUESTION: Have you ever had any IT
security problems?
Yes No
QUESTION: Is there a spending forecast
specifically dedicated to IT security?
® White Paper 2013 Isaca Venezia
Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement
Survey on 55 companies
Scenario
Yes No
® White Paper 2013 Isaca Venezia
Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement
Survey on 55 companies
QUESTION:
Assuming that you you have a critical infrastructure, are you
aware a violation of your IT systems may have consequences
outside your company?
• Regulations: decided by EU and focused around IC and its IT
security systems
• Italy also adds SMB
• Cyber attacks spread
• Principles work for all, not just for designated IC
• Approach based on risk management and to its assessment
to understand the context in which the business is located
• If the Production Plant use the same ICT technologies,
these may suffer the same risks the data room does (see
Stuxnet)
Source: BSI analysis about cyber security 2012
Factory’s scenario
YESTERDAY TODAY
ARCHITECTURE
physical
dedicated links
Open network
based on IP
ADSL, USB, WIFI
TECHNOLOGY
proprietary
systems using
specific protocols
Standard systems
with standard
protocols
INCIDENTS low Rapidly growing
Factory: Cybersecurity evolution
Factory: Cybersecurity evolution
YESTERDAY TODAY
ARCHITECTU
RE
physical
dedicated links
Open network
based on IP
ADSL, USB, WIFI
TECHNOLOG
Y
proprietary
systems using
specific protocols
Standard systems
with standard
protocols
INCIDENTS low Rapidly growing
SOURCE USA: http://www.scadahacker.com/
• Unauthorised use of remote manteinance services (eg. )
• Online attacks through the offices network
• Attacks to standard IT devices inthe production plant network
• DDOS attacks
• Human errors or sabotage
• Introduction of Viruses and Trojans through removable storages (USB,
cameras, mobile phones, …)
• Reading and writing of unencripted commands (VPN)
• Unauthenticated access to the factory system resources (and default
configurations)
• Violations to network devices
• Technical problems (backup configuration)
Source: BSI analysis about cyber security 2012
Factory: Top 10 Threat
I must prepare to
update!
What’s the
matter? It
works!
MORE INTERESTED
IN CYBERSECURITY
MORE INTERESTED
IN AVAILABILITY
Paul Steven
Production Manager vs. CIO
PROBLEM!
Factory Security requirements IT
Availability, Integrity,
Confidentiality
Security Priority Order Confidentiality, Integrity,
Availability
h24x365d 

(Restart not possible)
Availability Office time 8h

(Restart possible)
In the worst cases very serious,
even possible victims
Company Risk Money loss 

Privacy violation
Brand Reputation
10 - 20 Years Longevity infrastructure 3-5 Years
Real Time Response times Not Important
It depends on the Producer. But
long (one time every 1~4 years)
Update times Frequent and Regulars
Production & Automation Office Update responsibility IT Office
Different Standards / defined by
Nation
Security Standard International Standard
Devices (Equipment, Products) 

Services (Continuity)
Security Objective Information security
Production Manager vs. CIO
QUESTION:
Which of these IT security elements has never taken into
consideration?
® White Paper 2013 Isaca Venezia
Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement
Survey on 55 companies
Hacker ROI
MORE INTEREST
IN CYBERSECURITY
MORE INTEREST
IN AVAILABILITY
Where I create
more damage
and maybe I
can blackmail a
company
April 30, 2016. 

http://securityaffairs.co/wordpress/46824/malware/bwl-electric-ransomware.html
IC Incidents evolution
YESTERDAY TODAY
The level of information security will
become a value and reliable indicator for
the company.
More responsibility is required
WE Created 5 checklist, One for each of the five areas of
processes in which IS decomposed Management Business
Continuity For a Critical Infrastructure.
1. Preventive measures
2. Crisis Management Revision
3. Actual crisis managment
4. Follow-up (after the crisis)
5. Trainings
Our contribution: a self-assessment tool
First check list: Preventive measures
Preventive measures concerning the processes related to the
prevention of disasters .
Example
Area "preventive measures"
Section "Information Technology":
1.7.3.2 Critical data are stored in different places?
(This checks for backup located in multiple places )
Our contribution: a self-assessment tool
Second check list: Crisis Management Revision
The review of crisis management as the business environment
preparation so that there is an effective response to disastrous
situations.
Example
Area "Crisis Management Revision"
Section " Requested information and archives "
2.1.5.3 The necessary files are all at your fingertips?
(This checks for necessary files for crisis management)
Our contribution: a self-assessment tool
Third check list: Actual crisis managment
The management of real crisis includes the processes required to contain the
consequences of a disaster when it happens .
Example
Area "Managing the real Crisis“
Section "Treatment of critical data and archives"
3.2.9.1 The media and critical files are always kept in a fire-proof
containers and flooding?
(This checks the effectiveness of the archives and supports security measures
during a disaster )
Our contribution: a self-assessment tool
Fourth check list: Follow-up (after the crisis)
The follow-up allows to derive the elements of improvement of the
management system of direct experience in managing a disaster .
Example
Area "Follow -up"
4.9 It was done an inventory of damaged buildings , facilities and
equipment?
(Only when the crisis did occur, it operates a check on damaged equipment .
The follow-up is used to improve the system from the direct experience of a
crisis)
Our contribution: a self-assessment tool
Fifth check list: Trainings
The exercises are the response test their disaster .
Example
Area "Exercises "
Section "Generality"
5.1.3 The internal and external communication channels are tested?
(The exercises are necessary to hold the whole structure prepared to face
a possible crisis. The communication channels are one of the necessary
infrastructure to ensure efficient management of disasters )
Our contribution: a self-assessment tool
•Europe must impose a management of the problem and
support companies costs.
•Recognized standards, such as ISO 27001 or COBIT, are poorly
adopted by companies because it is not perceived as a value.
• Some Critical sectors (eg. Banks) already uses cybersecurity
framework standards (eg. ITA 263).
•Our check list can provide guidance to an auditor
•A Critical company must execute a Gap analysis on the
cybersecurity.
•SMB Critical Infrastructures and factories are a State
weakness
Conclusions
LUCA! You are always catastrophic
Why are we talking about this?
Why are we talking about this?
LUCA! Too much fantasy
Why are we talking about this?
Awareness
Italy 13-4-2016
http://www.zeusnews.it/n.php?c=24139 

Italian electric generator controlled by anyone via the Internet
Why are we talking about this?
Awareness
Prague 25 March 2016 

https://youtu.be/fwPu1hxXzNs
Question: Someone inquire about cybersecurity management?
CyberRisk Outsourcing in North East of Italy
Research in progress
Research 2016 – Via Virtuosa®
Cyber Risk Outsourcing in North East of Italy (Draft)
Survey on 70 companies
Question?
Thanks!
l.moroni@viavirtuosa.it
Free download

http://www.isaca.org/chapters5/Venice/Benefits/Documents/ISACA_VENICE_QUADERNI_05_INFRA_CRITICHE.pdf

More Related Content

What's hot

Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security AspectsPECB
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Ahmed Al Enizi
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...PECB
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 

What's hot (20)

Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security Aspects
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 

Viewers also liked

Aziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insuranceAziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insuranceLuca Moroni ✔✔
 
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Luca_Moroni
 
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las Empresas
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las EmpresasInversiones de Mediano y Largo Plazo para El Crecimiento de Las Empresas
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las EmpresasFUSADES
 
Royal graphics profile.compressed
Royal graphics profile.compressedRoyal graphics profile.compressed
Royal graphics profile.compressedZubair Khan
 
Magasinet Kommunikation Nr1
Magasinet Kommunikation Nr1Magasinet Kommunikation Nr1
Magasinet Kommunikation Nr1diddagrylarsen
 
Trabajo semana 1 agencia
Trabajo semana 1   agenciaTrabajo semana 1   agencia
Trabajo semana 1 agenciaAlejandragy
 
“Otra Ciudad”, por Juan Carlos Rico
“Otra Ciudad”, por Juan Carlos Rico“Otra Ciudad”, por Juan Carlos Rico
“Otra Ciudad”, por Juan Carlos RicoInstituto_Arquitetos
 
Banco version final
Banco version finalBanco version final
Banco version finalblucero
 
Aprendiendo sobre el Bonsai
Aprendiendo sobre el BonsaiAprendiendo sobre el Bonsai
Aprendiendo sobre el BonsaiJime23791
 
Phoenix Solar Company Presentation
Phoenix Solar Company PresentationPhoenix Solar Company Presentation
Phoenix Solar Company Presentationsavochalov
 
Simtoo star map dragonfly uav
Simtoo star map dragonfly uavSimtoo star map dragonfly uav
Simtoo star map dragonfly uav勇 李
 
Chocomel assigment
Chocomel assigmentChocomel assigment
Chocomel assigmentClaudia Orta
 
Technical note configuring the miro for cellular communications - r 30 sep 16
Technical note   configuring the miro for cellular communications - r 30 sep 16Technical note   configuring the miro for cellular communications - r 30 sep 16
Technical note configuring the miro for cellular communications - r 30 sep 16Ajeesh Joseph
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 

Viewers also liked (20)

Aziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insuranceAziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insurance
 
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
Liceo Jacopo da Ponte Bassano del Grappa "I Pericoli della Rete" Fare il papà...
 
Esp
EspEsp
Esp
 
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las Empresas
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las EmpresasInversiones de Mediano y Largo Plazo para El Crecimiento de Las Empresas
Inversiones de Mediano y Largo Plazo para El Crecimiento de Las Empresas
 
Royal graphics profile.compressed
Royal graphics profile.compressedRoyal graphics profile.compressed
Royal graphics profile.compressed
 
Magasinet Kommunikation Nr1
Magasinet Kommunikation Nr1Magasinet Kommunikation Nr1
Magasinet Kommunikation Nr1
 
Hawkins Update
Hawkins UpdateHawkins Update
Hawkins Update
 
Expo De Geno
Expo De GenoExpo De Geno
Expo De Geno
 
Trabajo semana 1 agencia
Trabajo semana 1   agenciaTrabajo semana 1   agencia
Trabajo semana 1 agencia
 
“Otra Ciudad”, por Juan Carlos Rico
“Otra Ciudad”, por Juan Carlos Rico“Otra Ciudad”, por Juan Carlos Rico
“Otra Ciudad”, por Juan Carlos Rico
 
Banco version final
Banco version finalBanco version final
Banco version final
 
Aprendiendo sobre el Bonsai
Aprendiendo sobre el BonsaiAprendiendo sobre el Bonsai
Aprendiendo sobre el Bonsai
 
Phoenix Solar Company Presentation
Phoenix Solar Company PresentationPhoenix Solar Company Presentation
Phoenix Solar Company Presentation
 
Simtoo star map dragonfly uav
Simtoo star map dragonfly uavSimtoo star map dragonfly uav
Simtoo star map dragonfly uav
 
Chocomel assigment
Chocomel assigmentChocomel assigment
Chocomel assigment
 
Lactogenesis
LactogenesisLactogenesis
Lactogenesis
 
Technical note configuring the miro for cellular communications - r 30 sep 16
Technical note   configuring the miro for cellular communications - r 30 sep 16Technical note   configuring the miro for cellular communications - r 30 sep 16
Technical note configuring the miro for cellular communications - r 30 sep 16
 
Fitt entrenament personal & rehabiitació
Fitt entrenament personal & rehabiitacióFitt entrenament personal & rehabiitació
Fitt entrenament personal & rehabiitació
 
Paulina rodriguez h_actividad1_2_mapac
Paulina rodriguez h_actividad1_2_mapacPaulina rodriguez h_actividad1_2_mapac
Paulina rodriguez h_actividad1_2_mapac
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 

Similar to ISACA SLOVENIA CHAPTER October 2016 - Lubiana

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...qqlan
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelSURFnet
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013qqlan
 
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...AmmLibera AL
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Tom King
 

Similar to ISACA SLOVENIA CHAPTER October 2016 - Lubiana (20)

Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
 
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3
 
Addressing CIP
Addressing CIPAddressing CIP
Addressing CIP
 

More from Luca Moroni ✔✔

Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton SpaGenerazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton SpaLuca Moroni ✔✔
 
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importanteLuca Moroni ✔✔
 
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...Luca Moroni ✔✔
 
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018Luca Moroni ✔✔
 
Articolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 oreArticolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 oreLuca Moroni ✔✔
 
IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?Luca Moroni ✔✔
 
Strumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPRStrumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPRLuca Moroni ✔✔
 
Scegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio CloudScegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio CloudLuca Moroni ✔✔
 
Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014Luca Moroni ✔✔
 
Frequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceFrequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceLuca Moroni ✔✔
 
Proteggere i dispositivi mobili
Proteggere i dispositivi mobiliProteggere i dispositivi mobili
Proteggere i dispositivi mobiliLuca Moroni ✔✔
 
Articolo aprile 2013 ict security
Articolo aprile 2013 ict securityArticolo aprile 2013 ict security
Articolo aprile 2013 ict securityLuca Moroni ✔✔
 
Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45Luca Moroni ✔✔
 
Aricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyberAricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyberLuca Moroni ✔✔
 
Convegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori criticiConvegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori criticiLuca Moroni ✔✔
 
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013Luca Moroni ✔✔
 

More from Luca Moroni ✔✔ (20)

Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton SpaGenerazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
 
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
 
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
 
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
 
Articolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 oreArticolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 ore
 
IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?
 
Strumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPRStrumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPR
 
Scegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio CloudScegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
 
Caso ip mosaic 2007
Caso ip mosaic 2007Caso ip mosaic 2007
Caso ip mosaic 2007
 
Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014
 
Frequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceFrequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk Insurance
 
Un Volo Sulla Cybersecurity
Un Volo Sulla CybersecurityUn Volo Sulla Cybersecurity
Un Volo Sulla Cybersecurity
 
Proteggere i dispositivi mobili
Proteggere i dispositivi mobiliProteggere i dispositivi mobili
Proteggere i dispositivi mobili
 
Articolo aprile 2013 ict security
Articolo aprile 2013 ict securityArticolo aprile 2013 ict security
Articolo aprile 2013 ict security
 
Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45
 
Aricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyberAricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyber
 
Realtà industriale 01 2015
Realtà industriale 01 2015Realtà industriale 01 2015
Realtà industriale 01 2015
 
Convegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori criticiConvegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori critici
 
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
 
Analisi del rischio Cyber
Analisi del rischio CyberAnalisi del rischio Cyber
Analisi del rischio Cyber
 

Recently uploaded

SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !risocarla2016
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxCarrieButtitta
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 

Recently uploaded (20)

SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 

ISACA SLOVENIA CHAPTER October 2016 - Lubiana

  • 1. Konferenca za izzive vodenja, tveganj, varnosti in revizije IKT Ljubljana, Oktober 2016 Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self- assesement
 
 Ozaveščenost o varnosti spleta in kritične infrastrukture v severni Italiji: Scenariji in smernice kako opraviti samooceno Luca Moroni, CISA, ITIL
 Via Virtuosa – ISACA Venice Chapter
  • 2.
  • 4. ISACA VENICE research team coordinator ✔ Research n.1: Vulnerability and Penetration Test. User’s guidelines about third party penetration test. 
 ✔ Research n.5: Cyber Security Awareness of N/E Italian Critical Infrastructures: Scenarios and Guidelines for self-assessment Member of ISACA VENICE Chapter Translation team ✔ Securing Mobile Devices – ITA Geaduation in Computer Science (1989 Milan), CISA e ITIL V3 certified and other tech certification Focused on Cybersecurity since 2000 and lecturer in some seminars about this topic Founder of the innovative company Via Virtuosa, which focuses on scouting and promotion expertise in Cybersecurity and IT governance in NE of Italy. Luca Moroni Who am i
  • 5. Giuseppe Esposito CISA, PMP, LA 27001, CSA- STAR, 22301, 9001, ITIL-V3 Foundation, ISO2000 Foundation Alessandro Guarino LA 27001 Pierlugi Sartori CISSP, CISM, CGEIT, CRISC, MBCI and Chapter past president Orillo Narduzzo for the trust My team in Research
  • 6. Seminar ISACA VENICE CHAPTER 3 Oct 2014 – Venice Dr. Marco Balduzzi (In)security of smart transportation at sea
 The Automated identification System (AIS)
  • 7. On 2014Th this question:
 Have you never done an internal Cybersecurity analysis? Where the analysis is composed of a series of processes that simulate the actions normally performed by an employee and consultant in the internal network. Yes No No need Vulnerability Assessment e Penetration Test. User’s guidelines in selection third parity of penetration tests
  • 8. Disaster 9 October 1963 - Vajont Dam. During initial filling, a massive landslide caused a man-made megatsunami in the lake. https://en.wikipedia.org/wiki/Vajont_Dam But if was a Company or a PA with an impact on social life?
  • 9. An infrastructure is considered critical in Europe if an incident would have a serious impact on the social life of the citizens, that is, for example, on health, physical and logical security or economic well- being of citizens or the effective functioning of the State; or it could lead to serious social consequences or other dramatic consequences for the community. What is a Critical Infrastructure (IC)?
  • 10. • Energy • Telecommunications • Water • Food • Health • Transports • Banks • Civil defence • ALL COMPANIES IN WHICH THE DAMAGEMENT OF SYSTEMS IMPACTS LIFE What is an Italian Critical Sector?
  • 11. 9/3/2014: The Italian Cabinet for the first time places first of the Cyber Threat. Italy has one of the highest rates in Europe of medium companies, small and micro - enterprises, which hold assets in terms of know -how. Two main problems : 1 ) Stakeholders using cyber tools 2 ) Small and medium-sized enterprises are far less protected Source: http://www.agendadigitale.eu/infrastrutture/722_cybercrime-danneggia-il-sistema-italia-per-20-40-mld-annui.htm Cyber Threat for Italian IC
  • 12. Feb. 2016: Special attention should be given to the legislative and regulatory framework that addresses issues related to the protection of critical infrastructure in the IC support sector. Source: http://www.mizs.gov.si/fileadmin/mizs.gov.si/pageuploads/Informacijska_druzba/pdf/Cyber_Security_Strategy_Slovenia.pdf Cyber Threat for Slovenia IC
  • 13. ® White Paper 2013 Isaca Venezia Cyber Security Awareness of Critical Infrastructures in North East of Italy: Scenario and Guidelines for self-assessment Survey on 55 companies The companies belonging to the sectors critics in the Italy North East Transports Food Water Telecommuni cations Health Transports Banks Civil Defence Energy
  • 14. Yes No ® White Paper 2013 Isaca Venezia Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement Survey on 55 companies QUESTION: Have you ever had any IT security problems?
  • 15. Yes No QUESTION: Is there a spending forecast specifically dedicated to IT security? ® White Paper 2013 Isaca Venezia Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement Survey on 55 companies
  • 17. Yes No ® White Paper 2013 Isaca Venezia Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement Survey on 55 companies QUESTION: Assuming that you you have a critical infrastructure, are you aware a violation of your IT systems may have consequences outside your company?
  • 18. • Regulations: decided by EU and focused around IC and its IT security systems • Italy also adds SMB • Cyber attacks spread • Principles work for all, not just for designated IC • Approach based on risk management and to its assessment to understand the context in which the business is located • If the Production Plant use the same ICT technologies, these may suffer the same risks the data room does (see Stuxnet) Source: BSI analysis about cyber security 2012 Factory’s scenario
  • 19. YESTERDAY TODAY ARCHITECTURE physical dedicated links Open network based on IP ADSL, USB, WIFI TECHNOLOGY proprietary systems using specific protocols Standard systems with standard protocols INCIDENTS low Rapidly growing Factory: Cybersecurity evolution
  • 20. Factory: Cybersecurity evolution YESTERDAY TODAY ARCHITECTU RE physical dedicated links Open network based on IP ADSL, USB, WIFI TECHNOLOG Y proprietary systems using specific protocols Standard systems with standard protocols INCIDENTS low Rapidly growing SOURCE USA: http://www.scadahacker.com/
  • 21. • Unauthorised use of remote manteinance services (eg. ) • Online attacks through the offices network • Attacks to standard IT devices inthe production plant network • DDOS attacks • Human errors or sabotage • Introduction of Viruses and Trojans through removable storages (USB, cameras, mobile phones, …) • Reading and writing of unencripted commands (VPN) • Unauthenticated access to the factory system resources (and default configurations) • Violations to network devices • Technical problems (backup configuration) Source: BSI analysis about cyber security 2012 Factory: Top 10 Threat
  • 22. I must prepare to update! What’s the matter? It works! MORE INTERESTED IN CYBERSECURITY MORE INTERESTED IN AVAILABILITY Paul Steven Production Manager vs. CIO PROBLEM!
  • 23. Factory Security requirements IT Availability, Integrity, Confidentiality Security Priority Order Confidentiality, Integrity, Availability h24x365d 
 (Restart not possible) Availability Office time 8h
 (Restart possible) In the worst cases very serious, even possible victims Company Risk Money loss 
 Privacy violation Brand Reputation 10 - 20 Years Longevity infrastructure 3-5 Years Real Time Response times Not Important It depends on the Producer. But long (one time every 1~4 years) Update times Frequent and Regulars Production & Automation Office Update responsibility IT Office Different Standards / defined by Nation Security Standard International Standard Devices (Equipment, Products) 
 Services (Continuity) Security Objective Information security Production Manager vs. CIO
  • 24. QUESTION: Which of these IT security elements has never taken into consideration? ® White Paper 2013 Isaca Venezia Cyber security awareness of critical infrastructures in N/E of Italy: scenarios and guidelines for self-assesement Survey on 55 companies
  • 25. Hacker ROI MORE INTEREST IN CYBERSECURITY MORE INTEREST IN AVAILABILITY Where I create more damage and maybe I can blackmail a company
  • 26. April 30, 2016. 
 http://securityaffairs.co/wordpress/46824/malware/bwl-electric-ransomware.html IC Incidents evolution YESTERDAY TODAY
  • 27. The level of information security will become a value and reliable indicator for the company. More responsibility is required
  • 28. WE Created 5 checklist, One for each of the five areas of processes in which IS decomposed Management Business Continuity For a Critical Infrastructure. 1. Preventive measures 2. Crisis Management Revision 3. Actual crisis managment 4. Follow-up (after the crisis) 5. Trainings Our contribution: a self-assessment tool
  • 29. First check list: Preventive measures Preventive measures concerning the processes related to the prevention of disasters . Example Area "preventive measures" Section "Information Technology": 1.7.3.2 Critical data are stored in different places? (This checks for backup located in multiple places ) Our contribution: a self-assessment tool
  • 30. Second check list: Crisis Management Revision The review of crisis management as the business environment preparation so that there is an effective response to disastrous situations. Example Area "Crisis Management Revision" Section " Requested information and archives " 2.1.5.3 The necessary files are all at your fingertips? (This checks for necessary files for crisis management) Our contribution: a self-assessment tool
  • 31. Third check list: Actual crisis managment The management of real crisis includes the processes required to contain the consequences of a disaster when it happens . Example Area "Managing the real Crisis“ Section "Treatment of critical data and archives" 3.2.9.1 The media and critical files are always kept in a fire-proof containers and flooding? (This checks the effectiveness of the archives and supports security measures during a disaster ) Our contribution: a self-assessment tool
  • 32. Fourth check list: Follow-up (after the crisis) The follow-up allows to derive the elements of improvement of the management system of direct experience in managing a disaster . Example Area "Follow -up" 4.9 It was done an inventory of damaged buildings , facilities and equipment? (Only when the crisis did occur, it operates a check on damaged equipment . The follow-up is used to improve the system from the direct experience of a crisis) Our contribution: a self-assessment tool
  • 33. Fifth check list: Trainings The exercises are the response test their disaster . Example Area "Exercises " Section "Generality" 5.1.3 The internal and external communication channels are tested? (The exercises are necessary to hold the whole structure prepared to face a possible crisis. The communication channels are one of the necessary infrastructure to ensure efficient management of disasters ) Our contribution: a self-assessment tool
  • 34. •Europe must impose a management of the problem and support companies costs. •Recognized standards, such as ISO 27001 or COBIT, are poorly adopted by companies because it is not perceived as a value. • Some Critical sectors (eg. Banks) already uses cybersecurity framework standards (eg. ITA 263). •Our check list can provide guidance to an auditor •A Critical company must execute a Gap analysis on the cybersecurity. •SMB Critical Infrastructures and factories are a State weakness Conclusions
  • 35. LUCA! You are always catastrophic Why are we talking about this?
  • 36. Why are we talking about this? LUCA! Too much fantasy
  • 37. Why are we talking about this? Awareness Italy 13-4-2016 http://www.zeusnews.it/n.php?c=24139 
 Italian electric generator controlled by anyone via the Internet
  • 38. Why are we talking about this? Awareness Prague 25 March 2016 
 https://youtu.be/fwPu1hxXzNs
  • 39. Question: Someone inquire about cybersecurity management? CyberRisk Outsourcing in North East of Italy Research in progress Research 2016 – Via Virtuosa® Cyber Risk Outsourcing in North East of Italy (Draft) Survey on 70 companies